the attack continues..

Jay Hennigan jay at west.net
Sat Oct 18 15:24:25 UTC 2008


Beavis wrote:
> Hello Lists,
> 
>     I'm still getting attacked and most of the IP's i got have been
> reported. and just this morning it looks as if someone is testing my
> network. and sending out short TCP_SESSION requests. now i may be
> paranoid but this past few days have been hell.. just want to know if
> the folks from these ip's can help me out.
> 
> Attacker IP,Attacker Port,Victim IP,Victim Port,Attack Type,Start
> Time,Extra Info
> 205.188.116.7,47198,200.0.179.73,80,TCP_SESSION,2008-10-18
> 14:20:48,Filtered IP: Dropped packets: 3 Dropped bytes: 156
> 205.188.117.134,45379,200.0.179.73,80,TCP_SESSION,2008-10-18
> 14:20:48,Filtered IP: Dropped packets: 0 Dropped bytes: 0
> 205.188.117.137,42257,200.0.179.73,80,TCP_SESSION,2008-10-18
> 14:20:48,Filtered IP: Dropped packets: 0 Dropped bytes: 0
> 75.105.128.38,4092,200.0.179.73,80,TCP_SESSION,2008-10-18
> 14:20:48,Filtered IP: Dropped packets: 0 Dropped bytes: 0
> 
> First 3 IP's come from AOL, I'll try to see if I can get their attention.
> 
> Last IP is from a Wildblue Communications WBC-39.

"Beavis", you're running a web server on 200.0.179.73, some sort of 
gambling site.  Those who operate web servers generally expect traffic 
to TCP port 80.  If you're not aware that you have a web server running, 
then it is most likely your machine that is infected with a bot.

--
Jay Hennigan - CCIE #7880 - Network Engineering - jay at impulse.net
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV




More information about the NANOG mailing list